Carl Tyler of http://www.epilio.com VM slides from IdoSphere.
Epilio offers Unified Communications solutions for IBM Lotus Sametime and Microsoft Lync.
Presentation given for ILTA in 12/2010 detailing the key preparations and migration strategies, as well as demonstrated several techniques to migrate your infrastrcuture to ESXi 4.1
A talk given at the FOSDEM conference 2008-02-24 in Brussels/Belgium in the Debian Devroom.
Video: http://meetings-archive.debian.net/pub/debian-meetings/2008/fosdem/ogg_theora/384x288/Update_on_Virtualization_in_Debian___Henning_Sprang.ogg
Presentation given for ILTA in 12/2010 detailing the key preparations and migration strategies, as well as demonstrated several techniques to migrate your infrastrcuture to ESXi 4.1
A talk given at the FOSDEM conference 2008-02-24 in Brussels/Belgium in the Debian Devroom.
Video: http://meetings-archive.debian.net/pub/debian-meetings/2008/fosdem/ogg_theora/384x288/Update_on_Virtualization_in_Debian___Henning_Sprang.ogg
This article demonstrates how iStorage Server works under VMware ESX Server. Such powerful combination will expand the application scope of your virtual server, thereby enabling WINDOWS server to expand the storage of your virtualized server. It also allows you to directly use the storage devices of the existing Windows server for VMware ESX Server. With IP SAN solution provided by iStorage Server, you may set up operating system, install application and server software, as well as store data required by your virtual machines. Your ESX Server storage can be expanded in the following 3-most-commonly-used ways:
• Use Virtual Image File Disk Device to create a file-based virtual storage device for VMware ESX Server, this allows quick data migration and backup.
• Directly use the physical disk or partition of Windows server. This enables you to make good use of resource. No additional configurations, just add the storage media to iSCSI Targets.
• Use CD/DVD/RW bridge device or Virtual CD/DVD to map physical CD/DVD drives or CD/DVD image files (iso, .bin, .mdf, .cdi, .b5i, .nrg, .ccd, .sub, .img, .raw) on your Windows server to CD/DVD devices on VMware ESX Server virtual machine.
After iStorage Server 2.0, it supports server side mirroring, synchronous replication and failover which allows user to create a high-availability iSCSI SAN for VMware ESX / ESXi Server.
Paul Durant, leader of the Windows PV Drivers effort in Xen Project, discusses the history, architecture, interfaces, and use of the drivers. Using the Windows PV Drivers yield higher performance for Windows VMs.
Automatic systems installations and change management wit FAI - Talk for Netw...Henning Sprang
How long does it take you, to recover an arbitrary server, or duplicate an arbitrary running configuration to a new system? Especially in the latter case without a full-backup, which would contain a wrong IP Address, Hostname and other things and would therefore eventually break some things - and are storage-exhaustive.
Get into FAI - Fully Automatic Installation.
FAI http://www.informatik.uni-koeln.de/fai/) is a framework for completely automated installations - via LAN, CD or USB stick, as well as configuration management for running systems. The concept "Plan your installation, and FAi installs your plan" supports, but also requires building a well planned and documented infrastructure. Configuration properties can be defined into the smallest possible Detail, and then be arbitrarily combined - a great advantage in environments with many different system types, which at the same time share one or multiple common bases and settings. FAI makes it possible to install and change many different systems at the same time.
In addition to all these things, with the grml-live software, FAI can even be used to build live cd's/usb sticks. This talk will give an overview of the functionality and possibilities of FAI, including a comparison with the also renowned software for similar, but not completely the same tasks, Puppet - which can even be integrated into FAI.
This is the presentation on VMware integration points, given on October 26, 2010, to the Eastern TN VMUG/EMC User Group at their meeting in Knoxville, TN.
Авторский учебный курс от Архитектора Microsoft Алексея Кибкало.
Поколения виртуальных машин
Автоматическая активация ОС в виртуальных машинах
Что такое Live Migration. Скорость работы, компрессия, миграция с WS2012 на WS2012R2
Живое изменение размера дисков виртуальных машин
Storage QoS, контроль и мониторинг производительности дисковых ресурсов
Клонирование и экспорт запущенных ВМ, экспорт снимков ВМ
Новые возможности в виртуальных машинах с Linux
Дисковая дедупликация для работающий VDI машин, дедупликация CSV
При поддержке "Звезды и С" www.stars-s.ru
BP209 doctors have scalpels, carpenters have hammers, ibm sametime develope...Carl Tyler
Often the hidden power of a platform lies in its Software Development Kits (SDKs) and IBM Sametime is no exception. IBM Sametime has one of the richest SDKs of any UC platform, and knowing about its capabilities can allow companies to understand further how they can fully exploit all of the capabilities Sametime offers. Come to this session to learn about the different SDK components and to see examples of how customers are using the SDK to integrate Sametime into their Communication Enabled Business Processes (CEBP)
This article demonstrates how iStorage Server works under VMware ESX Server. Such powerful combination will expand the application scope of your virtual server, thereby enabling WINDOWS server to expand the storage of your virtualized server. It also allows you to directly use the storage devices of the existing Windows server for VMware ESX Server. With IP SAN solution provided by iStorage Server, you may set up operating system, install application and server software, as well as store data required by your virtual machines. Your ESX Server storage can be expanded in the following 3-most-commonly-used ways:
• Use Virtual Image File Disk Device to create a file-based virtual storage device for VMware ESX Server, this allows quick data migration and backup.
• Directly use the physical disk or partition of Windows server. This enables you to make good use of resource. No additional configurations, just add the storage media to iSCSI Targets.
• Use CD/DVD/RW bridge device or Virtual CD/DVD to map physical CD/DVD drives or CD/DVD image files (iso, .bin, .mdf, .cdi, .b5i, .nrg, .ccd, .sub, .img, .raw) on your Windows server to CD/DVD devices on VMware ESX Server virtual machine.
After iStorage Server 2.0, it supports server side mirroring, synchronous replication and failover which allows user to create a high-availability iSCSI SAN for VMware ESX / ESXi Server.
Paul Durant, leader of the Windows PV Drivers effort in Xen Project, discusses the history, architecture, interfaces, and use of the drivers. Using the Windows PV Drivers yield higher performance for Windows VMs.
Automatic systems installations and change management wit FAI - Talk for Netw...Henning Sprang
How long does it take you, to recover an arbitrary server, or duplicate an arbitrary running configuration to a new system? Especially in the latter case without a full-backup, which would contain a wrong IP Address, Hostname and other things and would therefore eventually break some things - and are storage-exhaustive.
Get into FAI - Fully Automatic Installation.
FAI http://www.informatik.uni-koeln.de/fai/) is a framework for completely automated installations - via LAN, CD or USB stick, as well as configuration management for running systems. The concept "Plan your installation, and FAi installs your plan" supports, but also requires building a well planned and documented infrastructure. Configuration properties can be defined into the smallest possible Detail, and then be arbitrarily combined - a great advantage in environments with many different system types, which at the same time share one or multiple common bases and settings. FAI makes it possible to install and change many different systems at the same time.
In addition to all these things, with the grml-live software, FAI can even be used to build live cd's/usb sticks. This talk will give an overview of the functionality and possibilities of FAI, including a comparison with the also renowned software for similar, but not completely the same tasks, Puppet - which can even be integrated into FAI.
This is the presentation on VMware integration points, given on October 26, 2010, to the Eastern TN VMUG/EMC User Group at their meeting in Knoxville, TN.
Авторский учебный курс от Архитектора Microsoft Алексея Кибкало.
Поколения виртуальных машин
Автоматическая активация ОС в виртуальных машинах
Что такое Live Migration. Скорость работы, компрессия, миграция с WS2012 на WS2012R2
Живое изменение размера дисков виртуальных машин
Storage QoS, контроль и мониторинг производительности дисковых ресурсов
Клонирование и экспорт запущенных ВМ, экспорт снимков ВМ
Новые возможности в виртуальных машинах с Linux
Дисковая дедупликация для работающий VDI машин, дедупликация CSV
При поддержке "Звезды и С" www.stars-s.ru
BP209 doctors have scalpels, carpenters have hammers, ibm sametime develope...Carl Tyler
Often the hidden power of a platform lies in its Software Development Kits (SDKs) and IBM Sametime is no exception. IBM Sametime has one of the richest SDKs of any UC platform, and knowing about its capabilities can allow companies to understand further how they can fully exploit all of the capabilities Sametime offers. Come to this session to learn about the different SDK components and to see examples of how customers are using the SDK to integrate Sametime into their Communication Enabled Business Processes (CEBP)
AD109 - Using the IBM Sametime Proxy SDK: WebSphere Portal, IBM Connections -...Carl Tyler
From simple lightweight usage to full real world integration and development, the Sametime Proxy offers an exceptional range of social capabilities. This session will showcase our integration with Portal and Connections, and then move on to illustrate how the openness of the programming model makes it suitable for any environment, by extending SDK objects, managing events and overriding Sametime Proxy widget prototypes. This session will show you real world examples of how customers transformed regular web and mobile applications into those with a rich social experience using the Sametime Proxy
Is Affiliate Marketing Just an Alternative? (Basics, Size, Trends, Opportunit...Evgenii Prussakov
Geno Prussakov's presentation on whether affiliate marketing is "merely an alternative" (to other channels of online marketing). Presented on June 27, 2013 at Search Marketing Day in Poznan, Poland
In this congress, Keraben presented all the products guided to the russian market as pavements and ceramic tiles for kitchens, bathrooms, living rooms, exterior areas, ventilated facades, architectural projects done in all europe and novelties from ceramic fair of cevisama 2012.
BP501 - Building and deploying custom IBM sametime connect client installatio...Carl Tyler
IBM Sametime Connect is a powerful unified communications client, offering real-time communications capabilities. In this session, we'll cover how to build custom IBM Sametime installation packages, how to include interim fixes in the installation. We'll also cover how to customize various aspects of the client install with the installer, and how to ensure the install and uninstall is configured correctly. We'll also explain how you can manage IBM Sametime settings from the server post installation.
Presented by Carl Tyler of Epilio at IBM Connection 2014
You want to learn what virtualization is all about? I’ll talk about high level concepts, tips and tricks and best practices. You will learn all that and even why Azure might be an interesting choice when we talk developer virtualization. Concepts like Sysprep, Differencing drives, snapshot intrigue you? I’ll let you know all about them and more! Come join me to explore all that virtualization as to offer
Virtualization using VMWare WorkstationHitesh Gupta
This presentation contains an introductory view of techniques in virtualization and its implementation using VMWARE Workstation. So, if you are a complete beginner in this field, you may find this useful. If you need an accompanying 70 page document file, please feel free to ask.
*******************
I have used official VMWARE theme with permission and copyright information attached along with.
**********************
Building your own Desktop Cloud EnvironmentJnaapti
As developers we have seen these problems:
Our development environments accumulate lots of applications and libraries over a period of months.
We are usually in the habit of installing everything in one machine.
We fear that we may screw up our development environment and that means unproductive man-hours.
We forget that a multi-machine deployment is different from a single machine deployment.
How about virtualization in the desktop?
In this demo, I will take you through the steps to create a multi-VM development environment.
This demo will make use of QEMU, KVM and Virt Manager and show you how you can create a VM image, and then start servers with a set of commands, deploy your app, test everything and tear down the environment once you are happy - all this in the cosy comforts of your laptop or desktop.
The Jnaapti development environment is based on this setup.
There is No Server: Immutable Infrastructure and Serverless ArchitectureSonatype
Erlend Oftedal, Blank
Immutable infrastructure and serverless architectures have very interesting security properties. This talk will give an introduction to immutable infrastructure and serverless architecture and try to highlight some of the properties of such architectures. Next we will look at the positive effects this can have on the security of our systems, but also highlight some of the negative aspects and potential problems.
At the conclusion of this sessions, we hope to have shed some light on the positive and negative security effects of such architectures.
A very popular talk I have given at conferences around the country on building virtualized development environments for PHP using VirtualBox, Vagrant, and Puppet
In a single product, only NAKIVO offers VMware backup, replication, backup to cloud, global deduplication, instant VM and object recovery, backup copy, and screenshot verification.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!